Assignment: Security Architecture & Design
Seriously addressing and correcting STRIDE threat is an important step in the threat modeling process. Specific steps or guidelines are outlined in chapter 8 to ensure authentication and privacy.
Write a 300 word essay describing techniques used to authenticate and also ensure privacy when addressing threat modeling on your job. Include in this paper:
1. Two examples of authentication process used.
2. Two steps used to ensure privacy.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.